Simple Download Monitor Vulnerability (Medium) – CVE-2026-2383

Simple Download Monitor Vulnerability (Medium) – CVE-2026-2383

by | Feb 26, 2026 | Plugins

Attack Vectors

CVE-2026-2383 is a medium-severity Stored Cross-Site Scripting (XSS) issue (CVSS 6.4) affecting the Simple Download Monitor WordPress plugin (simple-download-monitor) in versions 4.0.5 and earlier. The vulnerability can be exploited by an authenticated user with Contributor-level access or higher by injecting malicious script into a custom field.

Because this is a stored XSS, the injected script is saved in your WordPress database and can execute later when other users view the impacted page(s) or content where that custom field is rendered. The CVSS vector indicates low attack complexity and no user interaction required for the script to run once it’s embedded in content that gets accessed.

Security Weakness

The root cause is insufficient input sanitization and output escaping in how Simple Download Monitor handles a custom field. In practical terms, the plugin does not adequately prevent script content from being saved, and/or does not safely render that content back to the browser.

This weakness matters operationally because many organizations grant Contributor access to support content workflows (marketing, comms, agencies, interns, or regional teams). If any Contributor account is compromised (or misused), it can become a path to persistently inject script into pages visited by staff, customers, or administrators.

Technical or Business Impacts

Stored XSS in a widely used CMS like WordPress can create immediate business exposure even when the severity is “Medium.” Potential impacts include brand damage (defaced or malicious content served to visitors), loss of customer trust, and campaign performance disruption if landing pages or download pages are affected.

From a risk and compliance perspective, XSS can also be leveraged to steal session data or perform actions in the victim’s browser session, increasing the likelihood of account takeover and unauthorized changes to site content. This can translate into incident response costs, downtime, and potential reporting obligations depending on what data is exposed and which users are impacted.

Remediation: Update Simple Download Monitor to version 4.0.6 or a newer patched release. Reference: Wordfence vulnerability advisory. CVE record: CVE-2026-2383.

Similar Attacks

Stored Cross-Site Scripting is a recurring issue in WordPress plugins and has been used in real-world compromises to inject malicious JavaScript, redirect traffic, and hijack admin sessions. Examples include:

wpDataTables plugin vulnerability analysis (Wordfence)

WordPress plugin exploitation leading to malicious injections (Wordfence)

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers